![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.
This book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2017, held in November 2017 in Tam Ky City, Vietnam. The 23 revised full papers presented were carefully selected from 31 submissions. The papers of ICCASA cover a wide spectrum in the area of context-aware-systems. CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection used to dynamically control computing and networking functions. The papers of ICTCC cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
|
![]() ![]() You may like...
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
|